Specifies that participants certified under the Voluntary Cybersecurity Program for Critical Infrastructure will receive (Sec. 104):

Liability protection from punitive damages;

Expedited security clearances;

Prioritized technical assistance;

Real-time cyber threat information; and

Public recognition.

Requires the Secretary of Homeland Security to inform the owner or operator of information infrastructure, located outside the United States, about any cyber risks that could result in damage to the U.S. and the government of the country in which the information infrastructure is located (Sec. 108).

Amends the Federal Information Security Management Act of 2002 (FISMA) to direct the Secretary of Homeland Security to oversee the information security requirements of federal agencies, whereas existing law placed oversight authority with the Director of the Office of Management and Budget (Sec. 201).

Establishes the National Center for Cybersecurity and Communications within the Department of Homeland Security (Sec. 242).

Requires private entities to protect information, acquired from system monitoring, that could be used to identify specific individuals (Sec. 702).

Note:

NOTE: THIS VOTE RECONSIDERS A PREVIOUS VOTE.

NOTE: THIS VOTE IS SUBJECT TO A SPECIAL ORDER REQUIRING A 3/5 MAJORITY FOR PASSAGE.

Specifies that participants certified under the Voluntary Cybersecurity Program for Critical Infrastructure will receive (Sec. 104):

Liability protection from punitive damages;

Expedited security clearances;

Prioritized technical assistance;

Real-time cyber threat information; and

Public recognition.

Requires the Secretary of Homeland Security to inform the owner or operator of information infrastructure, located outside the United States, about any cyber risks that could result in damage to the U.S. and the government of the country in which the information infrastructure is located (Sec. 108).

Amends the Federal Information Security Management Act of 2002 (FISMA) to direct the Secretary of Homeland Security to oversee the information security requirements of federal agencies, whereas existing law placed oversight authority with the Director of the Office of Management and Budget (Sec. 201).

Establishes the National Center for Cybersecurity and Communications within the Department of Homeland Security (Sec. 242).

Requires private entities to protect information, acquired from system monitoring, that could be used to identify specific individuals (Sec. 702).

Note:

NOTE: INVOKING CLOTURE REQUIRES A 3/5 MAJORITY OF THE SENATE. IT IS NOT A VOTE ON THE PASSAGE OF THE PIECE OF LEGISLATION, BUT LIMITS FURTHER DEBATE TO 30 HOURS. CLOTURE IS TYPICALLY USED TO END A FILIBUSTER. A FAILED CLOTURE VOTE OFTEN PREVENTS THE LEGISLATION FROM EVER COMING TO A VOTE.